294
all 18 comments
sorted by: hot top controversial new old
[-] Kongar@lemmy.dbzer0.com 95 points 8 months ago

This crap is the new norm. Companies compile your data, don’t secure it, and the whole world becomes victims of identity theft. Then they get free credit monitoring from the companies that screwed then.

Use a strong password manager with unique complicated passwords.

Freeze your credit.

Assume someone is trying to impersonate you and open credit cards in your name at all times.

Sad state of affairs today.

[-] linearchaos@lemmy.world 19 points 8 months ago

Freezing/unfreezing credit needs to be free and easy.

[-] Imgonnatrythis@sh.itjust.works 5 points 8 months ago

I've found it very easy. I just didn't know to do it until a couple years ago. I think it should be frozen by default.

[-] Substance_P@lemmy.world 59 points 8 months ago

"it’s not known whether the leak came from within the company or one of its vendors."

Isn't it time that big tech companies and their sale of private data get regulated? I see a giant class-action lawsuit in the making here.

[-] Lodra@programming.dev 37 points 8 months ago

This is regulated. And there are penalties for violating those regulations. But it’s just not enough. Even a class action lawsuit won’t help the victims. Most of that money goes to lawyers.

Honestly, I don’t expect any of it to change until the penalties are so severe that major companies go under. Aka a corporate death penalty (which the US used to have). But even then, good software security is extremely hard. Almost everyone screws up something.

[-] coolmojo@lemmy.world 7 points 8 months ago

It is. The third-party doctrine is a United States legal doctrine that holds that people who voluntarily give information to third parties—such as banks, phone companies, internet service providers (ISPs), and e-mail servers—have "no reasonable expectation of privacy" in that information. Source

[-] tal@lemmy.today 57 points 8 months ago* (last edited 8 months ago)

Social Security numbers should really not be considered secret data. Too many places have leaked them.

Maybe -- maybe -- they're okay for uniquely-identifying someone, but they're a really bad way to authenticate someone.

I mean, this breach alone -- if these are Americans -- is something like 20% of the US population.

You can't rely on something as authentication data if 20% of the population has irrevocable credentials that are floating around.

[-] cybersandwich@lemmy.world 28 points 8 months ago

I heard a security researcher say something like that a couple decades ago I think. The solution isn't to "safeguard SSN's", it's to make them pointless to have. Make it so you can't do anything with them.

Like you point out: this one breach alone could be 1/4 of the us population.

[-] tal@lemmy.today 3 points 8 months ago* (last edited 8 months ago)

For serious, emergency recovery, what I'd kind of like is some kind of service that performs physical validation of identity. Like, okay, say I lose my credentials to get into a bank account. So the bank gives me a recovery number, and I go down to the police station or something like that, and they do an identity check as part of that and sign off that you're who you say you are. Then if you're an identity thief, you're liable to get arrested right there. Charge a fee to cover the costs. Have a federal government server have to cryptographically sign that they're doing an identity validation so that the local cops can't silently sign off on someone else as being you. That should only come up if you've lost your credentials to something serious and need to get access again.

As an intermediate form of access, I suppose 2FA, though I'm not totally thrilled about having my keystore on a device that's network-connected, like a phone or computer, and has software getting put on it. Would rather have a physical USB-C dongle acting as a keystore with a small screen to identify the contents of a transaction being performed, and a physical "approve" button on the dongle. Plug that into a computer or smartphone or whatever. Maybe have different dongles for more- and less-sensitive stuff -- one for credit card payments that you carry around, one for insurance or something that you don't. Use pubkey authentication, not this shared-secret SSN stuff, so that if someone gets a company's database, it's useless in terms of letting them authenticate as you.

[-] Treczoks@lemmy.world 6 points 8 months ago

Just because way too many sites have a security that more or less non-existent, this should not be an excuse. Every breach should be severely punished. The only way corporations learn to take customer data safety seriously is through their wallets.

As long as customer data safety is just a cost factor, and penalties are just a mild slap on the wrist, there is no incentive to consider this as "just another cost of running business issue".

[-] minimalfootprint@discuss.tchncs.de 53 points 8 months ago

Why companies aren't fined for every customers data they didn't secure properly is beyond me. This should cost them a specific sum per customer or part of their annual global revenue. Make it hurt.

Otherwise they have no reason to spend money to properly secure people's data.

[-] webghost0101@sopuli.xyz 10 points 8 months ago* (last edited 8 months ago)

Devils advocate: It would give them additional insensitive to cover up the fact it happend.

My 2 cents: companies cant be trusted with your data and local data containers which you control, can give or reject limited acces to need to become the norm.

[-] WordBox@lemmy.world 5 points 8 months ago

Cant cover it up if the hackers take credit. And with the info collected it won't take much time to pin point where it came from.

[-] webghost0101@sopuli.xyz 3 points 8 months ago

Its happened before that leaks where covered up for months though, gives them time to sell stocks before public backlash .

[-] tal@lemmy.today 24 points 8 months ago

https://www.att.com/support/article/my-account/000101995?bypasscache=1

How do I know if my information was included?

If your information was impacted, you will be receiving an email or letter from us explaining the incident, what information was compromised, and what we are doing for you in response.

I think that you're gonna have a hard time tracking down 73 million people.

[-] RedEyeFlightControl@lemmy.world 24 points 8 months ago

You think they're going to send notices to ex-customers? I was an ATT customer for 2 decades and switched a few years ago. I'm wondering if I'm compromised, but won't get notice because I'm not technically an active customer.

[-] 667@lemmy.radio 1 points 8 months ago* (last edited 8 months ago)

So, basically every AT&T customer.

this post was submitted on 30 Mar 2024
294 points (100.0% liked)

Technology

60059 readers
2977 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 2 years ago
MODERATORS